STUDY AND COMPARISON OF VARIOUS IMAGE EDGEDETECTIONTECHNIQUES

Abstract

Edge detection is one of the most commonly used operations in image analysis, andthere are probably more algorithms in the literature for enhancing and detecting edgesthan any other single subject. The reason for this is that edges form the outline of anobject. An edge is the boundary between an object and the background, and indicatesthe boundary between overlapping objects. This means that if the edges in an image canbe identified accurately, all of the objects can be located and basic properties such asarea, perimeter, and shape can be measured. Since computer vision involves theidentification and classification of objects in an image, edge detections is an essentialtool. In this paper, we have compared several techniques for edge detection in imageprocessing.

Authors and Affiliations

Nidhi Chandrakar and Mr. Devanand Bhonsle

Keywords

Related Articles

Psychological aspects of male and female investors towards money matters

Financial sector is the backbone of any healthy nation. In finance theories it is assumed that people behave rationally and predictably when it is economic/financial matter. In several recent studies it is found that m...

Power Quality enhancement in MICROGRID (Islanding Mode) by Using ND - MLI DSTATCOM

Microgrids are systems with clusters of micro generators, which are installed for distributed power generation. When interfaced to the utility grid, microgrids are exposed to common utility power-quality disturbances....

Secure File Transmission Scheme Based on Hybrid Encryption Technique

To enhance the security level of data transmission in Open Network, a hybrid encryption Technique based on AES, RSA and MD5 is proposed. The mechanism makes full use of advantage of AES RSA, MD5 because encryption spee...

A NEW SYMMETRICAL ENCRYPTION ALGORITHM WITH HIGH SECURITYAND DATA RATE FOR WLAN

The hacking is the greatest problem in the wireless local area network (WLAN). Many algorithms like DES, 3DES, AES,CAST, UMARAM and RC6 have been used to prevent the outside attacks to eavesdrop or prevent the data to...

MAXIMIZATION OF RETURN ON INVESTMENT (ROI) BY HYPER PRODUCTIVE SOFTWARE DEVELOPMENT THROUGH SCRUM

The Research paper concentrated on the Scrum and focused on how to maximize the return on investment while developing the software especially in the IT (Information Technology) industry of Pakistan. The purpose of the...

Download PDF file
  • EP ID EP26666
  • DOI -
  • Views 337
  • Downloads 6

How To Cite

Nidhi Chandrakar and Mr. Devanand Bhonsle (2012). STUDY AND COMPARISON OF VARIOUS IMAGE EDGEDETECTIONTECHNIQUES. International Journal of Engineering, Science and Mathematics, 2(5), -. https://www.europub.co.uk/articles/-A-26666